The document discusses OS X malware analysis and provides information on:
- Common infection vectors for OS X malware including exploits and fake installers
- Persistence mechanisms like launch agents and browser extensions
- Features of OS X malware like collecting keylogs, downloads and executing files
- Steps to analyze a system for malware including checking processes, persistence and network connections
- Methods for analyzing suspicious files like code signing, hashing, strings extraction and class dumping